Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/303628
Title: | Design of fog computing based self protection system in internet of things |
Researcher: | Prabavathy S |
Guide(s): | Sundarakantham K |
Keywords: | Engineering and Technology Computer Science Computer Science Software Engineering Internet of Things Digital world Fog computing |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Internet of Things IoT is the future facing technology of digital world which connects the previously unconnected real world objects to internet IoT is penetrating into every aspect of our lives including our body home car and living environment This hyper connectivity and the heterogeneity characteristic of IoT have widened the attack surface of IoT Moreover IoT devices are deployed both in managed and unmanaged environment which make it vulnerable for attackers to create novel attacks The volume of data generated and the processing latency make the existing cloud based security mechanisms inadequate to handle the ever growing attacks in IoT Certain cyber attacks in IoT applications can lead to catastrophe and hence the attack has to be identified as early as possible to stop or reduce its impact by activating suitable response Therefore IoT requires self protect security mechanisms which can automatically interpret the attacks in IoT traffic and efficiently handle the attack scenario by activating appropriate response at a faster rate This requirement is satisfied by fog computing which can incorporate the intelligent self protection mechanism in the distributed fog nodes to handle the attack scenario at a faster rate and protect the IoT application with minimal human intervention This thesis seeks to design and develop a self protection system in IoT using fog computing to interpret the cyber attacks and efficiently handle them by suitable response The main objective of this research work is to implement the self protection mechanism at the distributed fog nodes which can autonomously detect the known attacks from the predefined attack patterns as well as predict the novel attacks with no predefined attack patterns and select the suitable response to neutralize the identified attack. newline |
Pagination: | xvi,136p. |
URI: | http://hdl.handle.net/10603/303628 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.98 kB | Adobe PDF | View/Open |
02_certificates.pdf | 189.4 kB | Adobe PDF | View/Open | |
03_abstracts.pdf | 8.62 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 5.29 kB | Adobe PDF | View/Open | |
05_contents.pdf | 13.13 kB | Adobe PDF | View/Open | |
06_list_of_tables.pdf | 5.82 kB | Adobe PDF | View/Open | |
07_list_of_figures.pdf | 10.02 kB | Adobe PDF | View/Open | |
08_list_of_abbreviations.pdf | 9.91 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 377.36 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 197.98 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 567.57 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 692.11 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 911.61 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 28.55 kB | Adobe PDF | View/Open | |
15_references.pdf | 148.66 kB | Adobe PDF | View/Open | |
16_list_of_publications.pdf | 107.43 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 157.62 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: